News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Secunia.com:
PHP Integer Overflow Vulnerability and Security Bypass
June 01, 2007 @ 11:33:00

Secunia has released an advisory for PHP today related to an issue caused by an integer overflow that could allow for bypassing of security of an application.

A weakness and a vulnerability have been reported in PHP 5, where the vulnerability has unknown impact and the weakness can be exploited by malicious, local users to bypass certain security restrictions.

The issue is caused by issues with the chunk_split and realpath functions that can lead to a bypass of the open_basedir restriction on a server.

The issue is marked as "moderately critical" and it is suggested that users update to PHP 5.2.3 to correct the issue.

0 comments voice your opinion now!
integer overflow vulnerability security bypass openbasedir integer overflow vulnerability security bypass openbasedir


blog comments powered by Disqus

Similar Posts

Justin Siltervon\'s Blog: 5 Reasons not to use OSCommerce

Demian Turner's Blog: Seagull 0.6.4 Release (fixes Security Isse from 0.6.3)

Secunis.com: Travelsized CMS index.php Cross-Site Scripting Vulnerabilities

Hardened-PHP Project: Advisory - PHP open_basedir Race Condition Vulnerability

Secunis.com: Travelsized CMS index.php Cross-Site Scripting Vulnerabilities


Community Events





Don't see your event here?
Let us know!


package laravel language deployment introduction zendserver community series list symfony framework podcast opinion release update install tips api library interview

All content copyright, 2014 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework